This is not a complete “how to steal the car”, but it does illustrate how, when tools are used for things they were not originally designed for, there can be unforeseen security issues as cyber criminals hunt for flaws, for example the internet for shopping and banking, and NFC and …
Continue reading “How to unlock a Tesla that does not belong to you!”